Recently I have received email from my bank/credit Card Company, eBay & pay pal saying that my account has possibly been compromised and I need to confirm my details and password in order to get continued access.
Spam email now has a new and more frightening variant, it's called phishing and it has been made by criminals and hackers who aim at getting unwitting consumers to reveal account numbers and passwords.
Usually after getting an email like the ones mentioned above from reputable companies, most of us would race to respond as quickly as possible. However, in most cases you will find that you won't be helping anyone other then the criminal who wrote that email and who has nothing to do with the actual organizations.
What is Phishing?
It is when someone creates false email that pretends to be from a bank or other authority, but which is actually designed to collect sensitive information such as passwords. This process of stealing information used for fraudulent purposes is the latest problem to plague Internet users. It is a phenomenon know as phishing i.e. emails 'fishing' for important information.
Just like Spam, phishing mails are sent to the widest possible audience so it's not unusual to receive a message asking you to confirm account details from an organization you do not actually deal with. You may be asked to fix up your eBay account when you haven't even got one!
In addition to collecting sensitive information many phishing messages try to install spy ware, Trojans etc. allowing hackers to gain backdoor entry into computers.
Types of Phishing Emails:
Some phishing emails ask for a response by email.
Some emails include a form for collecting details that you are told to fill out.
Some even include a link to a web site that resembles the actual site you expect to visit, but is actually a clone of the original site.
Number of active phishing sites reported in March, 2005: 2870
Number of brands hijacked by phishing campaigns: 78
Contains some form of target name in URL: 31%
Country hosting the most number of phishing sites: United States of America
Source: http://www.antiphishing.org
Phishing attacks can be really sophisticated. Some time ago a flaw in Internet Explorer allowed hackers to display a false address while redirecting the user to an entirely different site making it almost impossible to distinguish a phishing attack from a legitimate email.
Possible solutions:
New technologies can provide a better means of countering phishers. One option being explored by a lot of banks is the use of a secure token, a small electronic gadget that generates a unique password to be entered each time a user logs onto the web site. This would make a phishing attack useless because without the physical possession of a token it is impossible to access the account. This approach is somewhat similar to what is used at Automated Teller Machines around the world where you need to have both the card and the Pin number in order to use the machine.
One option is to use a technology popularly knows as PassMarks that effectively acts as a second password. After entering the user name a unique image pre selected by the user is displayed before s/he is asked for the password. If the proper image is not displayed the user will come to know that s/he is not on the authentic site. Another option that a lot of organizations are exploring is using text messages instead of email messages. Text messages cost money to send, so Spammers are less likely to partake in the process making it easier to distinguish between legitimate messages and fakes.
Ashish Jain
M6.Net Web Helpers http://www.m6.net
The trash folder in my main inbox hit 4000 today.... Read More
It's been with us since 1993, it's gotten more intrusive,... Read More
Pharming is one of the latest online scams and rapidly... Read More
Remember the television show about the nosy neighbor Mrs. Kravitz... Read More
Huge number of spyware software applications are available in the... Read More
It's a sad statistic, but hundreds of unsuspecting kids are... Read More
The Internet offers a global marketplace for consumers and businesses.... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
If you use the internet, you have probably been infected... Read More
First of all we need to get some terms stated.... Read More
Sooner or later everyone with an email account will receive... Read More
There are ways to insure security though. You can get... Read More
Did you know...? 1 in 5 children who use computer... Read More
Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
Identity theft is one of the most common criminal acts... Read More
When the Internet first came about, it was realized it... Read More
There are several basic concepts to keep in mind when... Read More
Only the top spyware removers are successful at detecting and... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
Fishing on the Internet has come a long way. However,... Read More
They're out there. Individuals trying to make a quick buck... Read More
Do you really have to know how feeds work? Not... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
If you are a parent, you have probably wondered at... Read More
After Two Security Assessments I Must Be Secure, Right? ---------------------------------------... Read More
At this point, if you've got the whole "turning the... Read More
First the basic definition of Spyware: It is a type... Read More
It seems that nowadays cybercriminals prefer cash to fun. That... Read More
A little bit of time invested into learning about internet... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
Today the internet is a mine field of malicious code... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
Before we start, I want to make it clear that... Read More
1. Geek Superhero http://www.deprice.com/geeksuperhero.htmGeek Superhero watches your computer for changes,... Read More
Computer infections can be broken up into 4 main categories... Read More
Have you ever bought a product or service from the... Read More
Phishing is a relatively new form of online fraud that... Read More
Security leaks can be a big problem for any site... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
First, let's do a little recap'. As I stated in... Read More
Is your enterprise following the rules?The bulk of financial information... Read More
Viruses are, however, not the only malicious software programs out... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
There is nothing more important that password security in world... Read More
One evening, during the graveyard shift, an AOL technical support... Read More
When we think of adware, what comes to mind are... Read More
I got a virus the other day, Thursday I believe... Read More
|